0% found this document useful (0 votes)
15 views6 pages

Networking and Cybersecurity-CURRICULUMm

Computer networking
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
15 views6 pages

Networking and Cybersecurity-CURRICULUMm

Computer networking
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 6

NETWORKING AND CYBERSECURITY FUNDAMENTALS

Powered by

SIDMACH TECHNOLOGIES

Course Overview:
Networking and cybersecurity fundamentals training typically cover a broad range of
topics essential for understanding how computer network function and how to secure
them against various threats. The goal of network security and cybersecurity is to
protect systems, networks, data, and programs from digital attacks.
As cyber-attacks continue to increase in frequency and sophistication, network
security and cybersecurity professionals must learn how to quickly identify and
mitigate vulnerabilities. In this course, you will learn networking fundamentals, and
common security terminology including threats, vulnerabilities, attacks, exploits,
controls, and countermeasures. Below is the outline of what the training will cover:

Curriculum

Introduction to Networking: 2 weeks


• Overview of computer networks and their importance.
• Types of networks (LAN, WAN, WLAN, etc.) and their characteristics.
• Explanation of network components: routers, switches, hubs, etc.
• Understanding network topologies: star, bus, ring, mesh, etc.
• Introduction to network protocols: TCP/IP, UDP, ICMP, etc.
Network Architecture: Week 1

• OSI (Open Systems Interconnection) model and TCP/IP model.


• Layers of the OSI model: physical, data link, network, transport, session,
presentation, application.

Intervention:
• Check for the week’s deliverable
• Check achievement for the week
• What are the impediments?

Routing and Switching:


• How routers and switches work.
• Routing protocols, RIP, OSPF, EIGRP, BGP.
• VLANs (Virtual Local Area Networks) and trunking.
Intervention:

• Check the level of students Understanding


• Ask what router is capable of doing
• Check if students understand different routing protocols
• Ask how VLAN works.
Network Security Fundamentals: 3 weeks

• Introduction to cybersecurity principles.


• Common network vulnerabilities and threats.
• Basic cryptography concepts: encryption, decryption, symmetric vs.
asymmetric encryption.
• Encryption techniques and protocols (SSL/TLS, IPsec, etc.).
• Authentication mechanisms (passwords, biometrics, multi-factor
authentication).
• Access control mechanisms: firewalls, routers, access control lists (ACLs).
• Principles of defense in depth and least privilege.
• Network segmentation and isolation.

Network Defence and Monitoring:


• Intrusion Detection Systems (IDS) and Intrusion Prevention Systems (IPS).
• Network monitoring tools and techniques.
• Incident response and handling.
• SNMP (Simple Network Management Protocol) for network device
management.
• Performance monitoring and troubleshooting.

Wireless Networking Security:


• Securing wireless networks: WEP, WPA, WPA2, WPA3.
• Wireless encryption protocols: WEP, WPA, WPA2, WPA3.
• Wireless access control: MAC filtering, SSID hiding.
SIDMACH Intervention:
• Ask the student to succinctly describe the Wireless Network Security.
• Ask the student to do a recap on common network vulnerabilities and
threats
• Ask what is network segmentation
• Ask the student to give practical examples of how Authentication works.
Cybersecurity Basics: 2 weeks
• Introduction to cybersecurity and its importance.
• Types of cyber threats (malware, phishing, social engineering, etc.).
• Security best practices for end-users (password hygiene, software updates,
etc.).
• Incident response and handling basics.
Cybersecurity Best Practices:

• Security awareness training for end-users.


• Secure configuration management.
• Patch management.
Security Policies and Compliance:
• Developing and implementing security policies and procedures.
• Regulatory compliance (e.g., GDPR, HIPAA, PCI DSS).
• Risk management principles and frameworks.
SIDMACH Intervention:
• Check the level of student understanding of Cybersecurity
• Ask the meaning of Malware with examples
• Ask how threats can be prevented on the network or PC
• Ask how Security policies and compliance work.

Introduction to Ethical Hacking: 2 weeks

• Understanding ethical hacking vs. malicious hacking.


• Penetration testing methodologies.
• Introduction to common hacking tools and techniques.
Hands-on Labs and Exercises:
• Practical exercises using Nmap, Wireshark, Snort, etc.
• Simulated network environments for hands-on learning.
SIDMACH Intervention:

• Ask the Student who is an Ethical and Malicious Hacker


• Ask the Student to enlist the hacking tools he knows and purposes
• Ask about the level of understanding about tools and how they can make
use of it.
4 weeks
Course Overview:

Microsoft Azure Security Fundamentals is a certification and training program


offered by Microsoft to help individuals understand the basics of security,
compliance, and identity within the Azure cloud computing platform. The
program is designed for beginners who are new to cloud security concepts
and aims to provide foundational knowledge and skills in securing Azure
resources.

Course Code: SC-900: (Microsoft Security, Compliance, and Identity


Fundamentals)

Module 1 (Week 1): Describe the concepts of security, compliance, and identity

▪ Describe Security and Compliance Concepts


▪ Describe Identity Concepts

SIDMACH Intervention:

➢ Observe the learners behavior and how the facilitator controls the class.
➢ Assess the basic understanding of Security and Compliance
concept.
➢ Find out if the learners have the full knowledge of Identity Concept.
Module 2 (Week 2): Describe the capabilities of Microsoft Azure Active
Directory, part of Microsoft Entra

▪ Describe the Function and Identity Types of Microsoft Entra ID


▪ Describe the Authentication Capabilities of Microsoft Entra ID
▪ Describe Access Management Capabilities of Microsoft Entra ID
▪ Describe the Identity Protection and Governance Capabilities of
Microsoft Entra.

SIDMACH Intervention:

From their knowledge of Identity Concept, can the students describe the
following?

➢ Function and Identity types of Microsoft Entra ID


➢ Understanding of Authentication
➢ Identity Protection and Governance Capabilities.
➢ What model of teaching is the facilitator employing to teach them.

Module 3 (Week 3): Describe the capabilities of Microsoft Security solutions

▪ Describe Core Infrastructure Security Services in Azure


▪ Describe the Security Management Capabilities in Azure
▪ Describe the Capabilities in Microsoft Sentinel
▪ Describe Threat Protection with Microsoft 365 Defender

SIDMACH Intervention:

➢ Assess the students’ knowledge of Infrastructure Security Services in


Azure.
➢ How reliable is the Security Management in Azure
➢ How can Threat Protection be achieved via Microsoft 365 Defender?

Module 4 (Week 4): Describe the capabilities of Microsoft compliance solutions

▪ Describe Microsoft’s Service Trust Portal and Privacy Capabilities


▪ Describe the Compliance Management Capabilities in Microsoft
Purview
▪ Describe Information Protection, Data Lifecycle Management, and
Data Governance Capabilities in Microsoft Purview
▪ Describe the Insider Risk Capabilities in Microsoft Purview
▪ Describe the eDiscovery and Audit Capabilities in Microsoft Purview
SIDMACH Intervention:

➢ Observe if they understand Microsoft Service Trust Portal and Privacy


Capabilities.
➢ What is Information Protection, Data Lifecycle and Governance
Capabilities?
➢ What do they understand by Insider Risk and its Mitigation?

Practical 8 weeks

You might also like